TTA Supported Service Availability -- The Value of Conformance Testing and a Look at the SAF Test Project -- Building Highly Available Application Using SA Forum Cluster: A Case Study of GGSN Application -- Using Logical Data Protection and Recovery to Improve Data Availability -- Contract-Based Web Service Composition Framework with Correctness Guarantees -- Practical Approach to Specification…
ISAS 2004 -- Architecture of Highly Available Databases -- Data Persistence in Telecom Switches -- Distributed Redundancy or Cluster Solution? An Experimental Evaluation of Two Approaches for Dependable Mobile Internet Services -- OpenHPI: An Open Source Reference Implementation of the SA Forum Hardware Platform Interface -- Quality of Service Control by Middleware -- Benefit Evaluation of High…
Semantic Web Services -- Automatic Location of Services -- Feta: A Light-Weight Architecture for User Oriented Semantic Service Discovery -- Optimally Distributing Interactions Between Composed Semantic Web Services -- A POP-Based Replanning Agent for Automatic Web Service Composition -- Process-Level Composition of Executable Web Services: ”On-the-fly” Versus ”Once-for-all” Composition…
The Self-Star Vision -- The Self-Star Vision -- Self-organization -- Evolving Fractal Gene Regulatory Networks for Graceful Degradation of Software -- Evolutionary Computing and Autonomic Computing: Shared Problems, Shared Solutions? -- Self-? Topology Control in Wireless Multihop Ad Hoc Communication Networks -- Emergent Consensus in Decentralised Systems Using Collaborative Reinforcement Lear…
Snap-Stabilizing Optimal Binary Search Tree -- Synchronous vs. Asynchronous Unison -- A Snap-Stabilizing DFS with a Lower Space Requirement -- Self-stabilization of Byzantine Protocols -- Self-stabilization with r-Operators Revisited -- Self-stabilization Preserving Compiler -- Self-stabilizing Mobile Node Location Management and Message Routing -- Memory Management for Self-stabilizing Operati…
Invited Talk (Abstract) -- Pervasive Computing – A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk …
Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.Security in E-Learning is organized in three parts. First, the author raises awareness that se…
Prologue -- Walk-through: Using UML for Security -- Background -- Developing Secure Systems -- Model-based Security Engineering with UML -- Applications -- Tool Support -- Tool support for UMLsec -- A Formal Foundation -- Formal Systems Development with UML -- Epilogue -- Further Material -- Outlook.Attacks against computer systems can cause considerable economic or physical damage. High-qualit…
Language Issues -- ULF-Ware – An Open Framework for Integrated Tools for ITU-T Languages -- An Access Control Language for Dynamic Systems – Model-Driven Development and Verification -- Non-deterministic Constructs in OCL – What Does any() Mean -- Engineering Issues -- Integrating RT-CORBA in SDL -- Component Development: MDA Based Transformation from eODL to CIDL -- Service Discovery and…
Component-Based Design of Embedded Software: An Analysis of Design Issues -- Component-Based Design of Embedded Software: An Analysis of Design Issues -- How Design Patterns Affect Application Performance – A Case of a Multi-tier J2EE Application -- An MDA-Based Approach for Inferring Concurrency in Distributed Systems -- Task-Based Access Control for Virtual Organizations -- Self-Deployment …